Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Treat token expirations as fatal errors #783

Merged
merged 1 commit into from
Jun 4, 2020

Conversation

jchambers
Copy link
Owner

@jchambers jchambers commented Jun 4, 2020

As a spiritual follow-on to #747, this fixes #568 by simply closing connections when the server thinks tokens have expired.

My best idea right now is that the server simply doesn't let connections use new tokens after one has actually expired and continues to respond to all subsequent notifications with an "expired token" response. If that's the case, our best recourse is to just close the connection and open a new one.

@jchambers jchambers added this to the v0.14.1 milestone Jun 4, 2020
@jchambers
Copy link
Owner Author

To clarify: because we're proactively expiring tokens, we should never actually wind up in a situation where the token has expired. Closing the connection deals what should be an exceptional case rather than serving as the primary mechanism for rotating tokens.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

"TooManyProviderTokenUpdates" received when sent a push notification to apns using .p8
1 participant